{"id":245,"date":"2025-07-11T16:03:31","date_gmt":"2025-07-11T16:03:31","guid":{"rendered":"https:\/\/bitcoscript.com\/article\/hacker-reimburses-funds-from-40m-gmx-hack\/"},"modified":"2025-07-11T16:03:31","modified_gmt":"2025-07-11T16:03:31","slug":"hacker-reimburses-funds-from-40m-gmx-hack","status":"publish","type":"post","link":"https:\/\/bitcoscript.com\/article\/hacker-reimburses-funds-from-40m-gmx-hack\/","title":{"rendered":"Hacker Reimburses Funds From $40M GMX Hack"},"content":{"rendered":"<p>GMX     <a href=\"https:\/\/www.coinspeaker.com\/coins\/gmx\/\" class=\"coinlive\" target=\"_blank\"><br \/>\n        <span class=\"coinlive__badge\"><br \/>\n            <span class=\"coinlive__ticker\">GMX<\/span><br \/>\n            <span class=\"coinlive__price value-fall\">$11.68<\/span><br \/>\n        <\/span><br \/>\n        <span class=\"coinlive__dropdown\"><br \/>\n\t\t\t            <span class=\"coinlive__row coinlive__vol24\"><br \/>\n                <span>24h volatility:<\/span><br \/>\n                <span class=\"value-fall\">4.2%<\/span><br \/>\n            <\/span><br \/>\n            <span class=\"coinlive__row\"><br \/>\n                <span>Market cap:<\/span><br \/>\n                <span>$119.26 M<\/span><br \/>\n            <\/span><br \/>\n            <span class=\"coinlive__hr\"><\/span><br \/>\n            <span class=\"coinlive__row\"><br \/>\n                <span>Vol. 24h:<\/span><br \/>\n                <span>$77.12 M<\/span><br \/>\n            <\/span><br \/>\n        <\/span><br \/>\n    <\/a><br \/>\n\t, a decentralized exchange on Arbitrum     <a href=\"https:\/\/www.coinspeaker.com\/coins\/arbitrum\/\" class=\"coinlive\" target=\"_blank\"><br \/>\n        <span class=\"coinlive__badge\"><br \/>\n            <span class=\"coinlive__ticker\">ARB<\/span><br \/>\n            <span class=\"coinlive__price value-growth\">$0.40<\/span><br \/>\n        <\/span><br \/>\n        <span class=\"coinlive__dropdown\"><br \/>\n\t\t\t            <span class=\"coinlive__row coinlive__vol24\"><br \/>\n                <span>24h volatility:<\/span><br \/>\n                <span class=\"value-growth\">11.5%<\/span><br \/>\n            <\/span><br \/>\n            <span class=\"coinlive__row\"><br \/>\n                <span>Market cap:<\/span><br \/>\n                <span>$1.97 B<\/span><br \/>\n            <\/span><br \/>\n            <span class=\"coinlive__hr\"><\/span><br \/>\n            <span class=\"coinlive__row\"><br \/>\n                <span>Vol. 24h:<\/span><br \/>\n                <span>$405.11 M<\/span><br \/>\n            <\/span><br \/>\n        <\/span><br \/>\n    <\/a><br \/>\n\t, was hit with a $40 million exploit on July 9 after an attacker drained its v1 liquidity pool by manipulating GLP token values.<\/p>\n<p>Soon after the exploit, the attacker left an on-chain message saying, \u201cOk, funds will be returned later,\u201d which was flagged by blockchain security firm PeckShield.<\/p>\n<p>Less than an hour later, the attacker began sending stolen crypto back to GMX, signaling they had accepted the white hat bounty offered by the team.<\/p>\n<blockquote class=\"twitter-tweet\" data-width=\"474\" data-dnt=\"true\">\n<p lang=\"en\" dir=\"ltr\"><a rel=\"noopener noreferrer\" target=\"_blank\" href=\"https:\/\/twitter.com\/hashtag\/PeckShieldAlert?src=hash&amp;ref_src=twsrc%5Etfw\">#PeckShieldAlert<\/a> <a rel=\"noopener noreferrer\" target=\"_blank\" href=\"https:\/\/twitter.com\/hashtag\/GMX?src=hash&amp;ref_src=twsrc%5Etfw\">#GMX<\/a> Exploiter msg: funds will be returned later <a rel=\"noopener noreferrer\" target=\"_blank\" href=\"https:\/\/t.co\/ohlOVYWSvD\">pic.twitter.com\/ohlOVYWSvD<\/a><\/p>\n<p>&mdash; PeckShieldAlert (@PeckShieldAlert) <a rel=\"noopener noreferrer\" target=\"_blank\" href=\"https:\/\/twitter.com\/PeckShieldAlert\/status\/1943564064501985691?ref_src=twsrc%5Etfw\">July 11, 2025<\/a><\/p>\n<\/blockquote>\n<p>The attacker, known as &#8220;GMX Exploiter 2,&#8221; began <a rel=\"noopener noreferrer\" target=\"_blank\" href=\"https:\/\/etherscan.io\/address\/0x8D1d2e24eC641eDC6a1ebe0F3aE7af0EBC573e0D\">returning the stolen crypto<\/a> and has since sent back over $9 million in Ether     <a href=\"https:\/\/www.coinspeaker.com\/coins\/ethereum\/\" class=\"coinlive\" target=\"_blank\"><br \/>\n        <span class=\"coinlive__badge\"><br \/>\n            <span class=\"coinlive__ticker\">ETH<\/span><br \/>\n            <span class=\"coinlive__price value-growth\">$2 949<\/span><br \/>\n        <\/span><br \/>\n        <span class=\"coinlive__dropdown\"><br \/>\n\t\t\t            <span class=\"coinlive__row coinlive__vol24\"><br \/>\n                <span>24h volatility:<\/span><br \/>\n                <span class=\"value-growth\">6.5%<\/span><br \/>\n            <\/span><br \/>\n            <span class=\"coinlive__row\"><br \/>\n                <span>Market cap:<\/span><br \/>\n                <span>$356.59 B<\/span><br \/>\n            <\/span><br \/>\n            <span class=\"coinlive__hr\"><\/span><br \/>\n            <span class=\"coinlive__row\"><br \/>\n                <span>Vol. 24h:<\/span><br \/>\n                <span>$39.25 B<\/span><br \/>\n            <\/span><br \/>\n        <\/span><br \/>\n    <\/a><br \/>\n\t. PeckShield disclosed that the GMX team also received over $5.5 million in FRAX tokens from the attacker.<\/p>\n<p>In another transaction, the attacker sent FRAX     <a href=\"https:\/\/www.coinspeaker.com\/coins\/frax\/\" class=\"coinlive\" target=\"_blank\"><br \/>\n        <span class=\"coinlive__badge\"><br \/>\n            <span class=\"coinlive__ticker\">FRAX<\/span><br \/>\n            <span class=\"coinlive__price value-fall\">$1.00<\/span><br \/>\n        <\/span><br \/>\n        <span class=\"coinlive__dropdown\"><br \/>\n\t\t\t            <span class=\"coinlive__row coinlive__vol24\"><br \/>\n                <span>24h volatility:<\/span><br \/>\n                <span class=\"value-fall\">0.0%<\/span><br \/>\n            <\/span><br \/>\n            <span class=\"coinlive__row\"><br \/>\n                <span>Market cap:<\/span><br \/>\n                <span>$314.25 M<\/span><br \/>\n            <\/span><br \/>\n            <span class=\"coinlive__hr\"><\/span><br \/>\n            <span class=\"coinlive__row\"><br \/>\n                <span>Vol. 24h:<\/span><br \/>\n                <span>$2.65 M<\/span><br \/>\n            <\/span><br \/>\n        <\/span><br \/>\n    <\/a><br \/>\n\t tokens with $5 million to the GMX address. The attacker has sent about $20 million worth of cryptocurrencies.<\/p>\n<blockquote class=\"twitter-tweet\" data-width=\"474\" data-dnt=\"true\">\n<p lang=\"en\" dir=\"ltr\"><a rel=\"noopener noreferrer\" target=\"_blank\" href=\"https:\/\/twitter.com\/hashtag\/PeckShieldAlert?src=hash&amp;ref_src=twsrc%5Etfw\">#PeckShieldAlert<\/a> <a rel=\"noopener noreferrer\" target=\"_blank\" href=\"https:\/\/twitter.com\/hashtag\/GMX?src=hash&amp;ref_src=twsrc%5Etfw\">#GMX<\/a> Exploiter has returned 5.49M <a rel=\"noopener noreferrer\" target=\"_blank\" href=\"https:\/\/twitter.com\/search?q=%24FRAX&amp;src=ctag&amp;ref_src=twsrc%5Etfw\">$FRAX<\/a> to <a rel=\"noopener noreferrer\" target=\"_blank\" href=\"https:\/\/twitter.com\/hashtag\/GMX?src=hash&amp;ref_src=twsrc%5Etfw\">#GMX<\/a>: Deployer <a rel=\"noopener noreferrer\" target=\"_blank\" href=\"https:\/\/t.co\/q4hi6DsAX1\">pic.twitter.com\/q4hi6DsAX1<\/a><\/p>\n<p>&mdash; PeckShieldAlert (@PeckShieldAlert) <a rel=\"noopener noreferrer\" target=\"_blank\" href=\"https:\/\/twitter.com\/PeckShieldAlert\/status\/1943582832338825586?ref_src=twsrc%5Etfw\">July 11, 2025<\/a><\/p>\n<\/blockquote>\n<h2>What Happened After the Attack?<\/h2>\n<p>Shortly after the July 9 attack on GMX, the exchange announced on X that it was offering a $5 million bounty, which is roughly 12.5 percent of the stolen amount, if the attacker returned the funds.<\/p>\n<p>GMX also said the incident would be treated as a white hat hack and the attacker could keep the bounty without facing any legal consequences.<\/p>\n<p>The team also mentioned they were prepared to provide proof of source of funds if the attacker needed it to use the bounty. They gave the attacker a 48-hour window to return the funds before initiating legal proceedings.<\/p>\n<p>The crypto exchange announced that the attacker could retain 10% of the stolen funds as a white hat bounty reward, provided that 90% of the crypto was returned to the designated addresses.<\/p>\n<p>This type of exploit is common among platforms in the crypto space. Hackers often manipulate oracles or internal data to artificially deflate a token\u2019s value, allowing them to drain assets by swapping at distorted prices.<\/p>\n<p>A few weeks ago, Resupply.Fi was a victim to this, losing $9.6 million to the exploitation. The attacker distorted the value of crvUSD, collapsing its exchange rate against reUSD to zero. This manipulation made it possible to borrow assets nearly free of charge.<\/p>\n<p>next<\/p>\n<p>The post Hacker Reimburses Funds From $40M GMX Hack appeared first on Coinspeaker.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>GMX GMX $11.68 24h volatility: 4.2% Market cap: $119.26 M Vol. 24h: $77.12 M , a decentralized exchange on Arbitrum ARB $0.40 24h volatility: 11.5% Market cap: $1.97 B Vol. 24h: $405.11 M , was hit with a $40 million exploit on July 9 after an attacker drained its v1 liquidity pool by manipulating GLP&hellip;<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[4],"tags":[7,99,8],"class_list":["post-245","post","type-post","status-publish","format-standard","hentry","category-cryptocurrency-news","tag-cryptocurrency-news","tag-gmx","tag-news"],"_links":{"self":[{"href":"https:\/\/bitcoscript.com\/article\/wp-json\/wp\/v2\/posts\/245","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/bitcoscript.com\/article\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/bitcoscript.com\/article\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/bitcoscript.com\/article\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/bitcoscript.com\/article\/wp-json\/wp\/v2\/comments?post=245"}],"version-history":[{"count":0,"href":"https:\/\/bitcoscript.com\/article\/wp-json\/wp\/v2\/posts\/245\/revisions"}],"wp:attachment":[{"href":"https:\/\/bitcoscript.com\/article\/wp-json\/wp\/v2\/media?parent=245"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/bitcoscript.com\/article\/wp-json\/wp\/v2\/categories?post=245"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/bitcoscript.com\/article\/wp-json\/wp\/v2\/tags?post=245"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}